A Taxonomy of Mechanisms for Multi-Access

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

Ethernet – CSMA/CD Review
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
Medium Access Control Sublayer
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
Chapter 8 LAN Technologies and Network Topology
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Multiple Access Methods
IEEE standards.
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Circuit Switching Circuit switching refers to a communication mechanism that establishes a path between a sender and receiver with guaranteed isolation.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Department of Engineering Science ES465/CES 440, Intro
NETWORKING TECHNOLOGIES (II)
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Ethernet – CSMA/CD Review
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
7- chapter Seven Local Area Networks (LAN)
Figure 3.1 Internet model.
Multiple Access Methods
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

A Taxonomy of Mechanisms for Multi-Access How do multiple, independent computers coordinate access to a shared medium? There are three broad approaches: they can use a modified form of a multiplexing technique they can engage in a distributed algorithm for controlled access or they can use a random access strategy Figure 14.1 illustrates the taxonomy including specific forms of each approach © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

A Taxonomy of Mechanisms for Multi-Access Fig. 14.1 A Taxonomy of Mechanisms for Multi-Access © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Static and Dynamic Channel Allocation Channelization refers to a mapping between a given communication and a channel in the underlying system There should be a mapping between entities and a channel is referred to as 1-to-1 and static Static channel allocation works well for situations where the set of communicating entities is known in advance and does not change © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Controlled Access Protocols Controlled access protocols provide a distributed version of statistical multiplexing Figure 14.3 (below) lists the three principal forms: These will be discussed in the following sub-sections © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Controlled Access Protocols Reservation - it is often used with satellite transmission It employs a two-step process in which each round of packet transmissions is planned in advance Typically, reservation systems have a central controller that follows Algorithm 14.2 © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Controlled Access Protocols Token Passing - it is most often associated with ring topologies Although older LANs used token passing ring technology popularity has decreased, and few token passing networks remain Imagine a set of computers connected in a ring and imagine that at any instant, exactly one of the computers has received a special control message called a token When no station has any packets to send the token circulates among all stations continuously For a ring topology, the order of circulation is defined if messages are sent clockwise, the next station mentioned in the algorithm refers to the next physical station in a clockwise order When token passing is applied to other topologies (bus) each station is assigned a position in a logical sequence and the token is passed according to the assigned sequence © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Random Access Protocols © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Random Access Protocols Researchers at Xerox PARC created a random access protocol (1973) In 1978, a standard (also called the DIX standard) was created It is widely known as Ethernet It uses cable as a shared medium instead of broadcasting radio frequency transmissions through the atmosphere Ethernet uses three (3) mechanisms to handle collisions: Carrier sense Collision detection Binary exponential backoff © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Random Access Protocols Binary Exponential Backoff After a collision occurs a computer must wait for the cable to become idle again before transmitting a frame Randomization is used to avoid having multiple stations transmit simultaneously as soon as the cable is idle The standard specifies a maximum delay, d, and requires each station to choose a random delay less than d after a collision occurs When two stations each choose a random value the station that chooses the smallest delay will proceed to send a packet and the network will return to normal operation In the case where two or more computers happen to choose nearly the same amount of delay they will both begin to transmit at nearly the same time producing a second collision © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Random Access Protocols By using exponential backoff an Ethernet can recover quickly after a collision because each computer agrees to wait longer times between attempts when the cable becomes busy Even in the unlikely event that two or more computers choose delays that are approximately equal exponential backoff guarantees that contention for the cable will be reduced after a few collisions  The combination of techniques described above is known by the name Carrier Sense Multi-Access with Collision Detection (CSMA/CD) Algorithm 14.4 summarizes CSMA/CD © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Random Access Protocols CSMA/CD does not work as well in wireless LANs because a transmitter used in a wireless LAN has a limited range A receiver that is more δ than away from the transmitter will not receive a signal, and will not be able to detect a carrier Consider three computers with wireless LAN hardware positioned as Figure 14.6 (below) illustrates  © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Random Access Protocols Wireless LANs use a modified access protocol known as CSMA with Collision Avoidance (CSMA/CA) The CSMA/CA triggers a brief transmission from the intended receiver before transmitting a packet © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

Random Access Protocols The idea is that if both the sender and receiver transmit a message all computers within range of either will know a packet transmission is beginning Figure 14.7 (below) illustrates the sequence © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.